Sciweavers

1988 search results - page 291 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
119
Voted
C5
2009
IEEE
15 years 9 months ago
Pitsupai
In this paper we present an authoring tool and an accompanying workflow to create interactive scenarios in a distributed 3D environment by multiple users. With Pitsupai we design...
Philipp Engelhard, Robert Hirschfeld, Jens Lincke
CCS
2005
ACM
15 years 8 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
CCS
2006
ACM
15 years 6 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
142
Voted
MIDDLEWARE
2007
Springer
15 years 8 months ago
A service-oriented middleware for context-aware applications
Context awareness has emerged as an important element in distributed computing. It offers mechanisms that allow applications to be aware of their environment and enable these appl...
Luiz Olavo Bonino da Silva Santos, Remco Poortinga...
142
Voted
HPDC
2010
IEEE
15 years 3 months ago
Data parallelism in bioinformatics workflows using Hydra
Large scale bioinformatics experiments are usually composed by a set of data flows generated by a chain of activities (programs or services) that may be modeled as scientific work...
Fábio Coutinho, Eduardo S. Ogasawara, Danie...